SlideShare a Scribd company logo
1 of 5
Download to read offline
26/01/17 Page 1
Adel Zayed
Personal Information:
Nationality: Egyptian
Date of Birth: 1979.
Place of Birth: Cairo.
Marital Status: Married.
GSM no. 054 425 4400
pension.gov.sa@azayedEmail
Personal Profile
A multi-skilled Network & Security Advisor with good all-round supervisory and technical
expertise. Very capable with a proven ability to ensure the smooth Managing of IS Security
systems and to provide IT services that will improve the efficiency and performance of a company.
Extensive practical knowledge of complex systems builds, hardware and software Security
Systems, network support, technical support and Monitoring Systems.
Looking for a new and challenging managerial position, one that will make best use of my existing
skills & experiences also further my personal development
Key competencies and skills
Managerial
 Ability to identify, understand and give priority to urgent issues.
 Able to work on cross-divisional projects.
 Experience of recruiting and training new staff.
 Skilled decision maker, problem solver, team oriented, team builder
 Able to develop, coordinate, delegate and plan work activities.
 Dealing calmly and professionally with challenging situations.
 Planning each stages of an IT project in detail, and investigating how it can affect a
business.
IT
 Over 14 years of Experience in the fields of network and Security.
 Able to identify cost-effective technical solutions that meet business needs.
 Excellent analytical, data manipulation and interrogation skills.
 Ensuring that all IT changes are managed so that they minimize downtime and risk of any
inconvenience.
 Developing and maintaining the infrastructure and information security Management
systems.
26/01/17 Page 2
Having extensive hands-on experience on all lot of network & Security Technologies:-
 Cisco Routers, Switches, Cisco ASA, and IPS
 Forigate FW, FortiWeb WAF and Forti Analyzer
 Palo Alto FW
 FireEye APT
 Websense web filtering Gateway & Clear Swift Email Gateway
 Juniper Switching and SRX firewall.
 MacAfee IPS
 F5 LTM & GTM
 Riverbed WAN Optimizer
 Nexthink End Point Analytics
 Virtualization technology “VSphere and VDI”
 Windows services AD, DHCP, DNS, WINS, TMG 2010, and Exchange 2007/2010.
 Network management S/W ", Ipswich, Manage engine and solarwinds
Academic qualifications
- BS Communication and computer Engineering 2001,
- Faculty of Engineering – Ain shams University.
- Very Good grade.
Certificates
 CISM Certified
 CISSP Certified
 CCIE Security w.
 ISO 27001 Lead Auditor
 CEH ver8 Certified
 Project Management Professional Certified "PMP".
 ITIL Foundation ver3 Certificate.
 VMware Certified Professional 5 – Data Center Virtualization (VCP5-DCV)
 CCIE R&S w
 CCNP- R&S.
 CCNP- Security.
ADDITIONAL TRAINING
 CISM Attendance Course
 Microsoft Operation Framework (MOF v4)
 MCITP and Exchange 2007
 Palo Alto & Fortigate Administration
 Data Center Designing Awareness.
26/01/17 Page 3
Career history
Oct 2011 – Present:
Corporate Name: PUBLIC PENSION AGENCY (PPA).
Department: Network & Security Advisor.
Location: Riyadh.
Job Duties:
 Secures the organization and its people by maintaining an intelligence network; designing and
implementing policies and strategies of organization security (including internal investigations);
safeguarding executives, Board of Directors, and their immediate families from random or
premeditated threats; preventing workplace violence; implementing and securing technological
protection systems, proprietary information protection, and computer security; providing crisis
management; maintaining environmental health and safety.
 Determines executive protection requirements by gathering and reviewing pre-planning travel
intelligence information; issuing travel advisories; modifying travel itineraries; making travel
security arrangements, including guards, secure accommodations, and security-equipped
transportation.
 Develops new security programs by strategically reviewing existing security programs;
conducting comprehensive studies of present and anticipated threats; evaluating, analyzing, and
continuously reviewing collection activity results on potential threats against the organization.
 Provides protection of organization assets, capital assets, and proprietary assets by providing
consulting support; building consensus on the appropriateness and timeliness of physical and
electronic monitoring improvements or enhancements; developing and implementing changes.
 Provides crisis management team and disaster management team leadership by providing
state-of-the art expertise; collecting, analyzing, and summarizing intelligence data and trends;
developing cutting-edge strategies.
 Maintains protection systems by developing and refining philosophy and design standards
relating to protection systems (burglar, fire, and duress alarms and video coverage); re-defining
procedures (international and domestic travel, kidnap, ransom, event security); examining
organization security emergency response systems; reviewing building design (construction,
modifications, walls, fences, and landscape); making recommendations for physical plant security
improvements.
 Provides information by reviewing, developing, and continually refining security operation's
operational manuals and procedures; briefing executives and managers on security-related issues.
 Secures information systems by dealing with electronic threats and vulnerabilities, privacy
issues, physical security, and operations continuity; applying security forensic technologies;
monitoring network and systems management processes; maintaining security platforms with
certification authority, and state-of-the-art security management products, tools, and offerings.
 Updates job knowledge by maintaining "expert" status in the security industry; applying state-
of-the art security measures; participating in educational opportunities; reading professional
publications; maintaining personal networks; being sought as an authority to contribute to the
security industry body of knowledge; participating in professional organizations.
 Enhances organization security reputation by accepting ownership for accomplishing new and
different requests; exploring opportunities to add value to job accomplishments; keeping the
organization and its people out of harm's way.
 Managing Network Security Systems “ Fortigate , Palo Alto , cisco Firewalls “ Cisco routers,
ASA, SRX FW, SSL-VPN and ACS.
26/01/17 Page 4
 Ensuring all IT systems, infrastructures, server, networks and securities are running to
An efficient level.
 Guide to the preparation of policies and procedures for information security.
 Project Manager for Disaster Recovery (DR Site).
April .2006 till May 2011
Corporate Name: Ministry of Islamic Affairs (MOIA).
Department: Network & Security Specialist + Project Manager
Location: Riyadh
Roles and Responsibilities:
 Re-engineering of enterprise network designs to meet increasing customer demands
 Designed and implemented Internal Computing network infrastructure including Gigabit Ethernet
backbone,
 100mbs desktop switching
 Directly responsible for mentoring and assisting fourteen Network, System, and Application.
 Managing / providing support to ALL Ministry branches Locations across the kingdom
 Responsible for internal network serving more than 1000 nodes, 25 servers, 50 edge switch, 2 core
Switches Cisco routers, ASA, IPS, MARS, LMS, CCM, Unity, GWs
 Trouble shooting and problem resolution of all customer network difficulties
 7Documentation of all the work done using Visio, Excel and MS word.
April .2005 till April 2006
Corporate Name: ICT Training Center.
Department: CCNA, CCNP Technical Instructor
Location: Cairo, Egypt
Roles and Responsibilities:
Providing Cisco training courses in various locations including:-
 ICT Training center - Cairo.
 Engineering Syndicate – Cairo
 Faculty of engineers "Ain shams University"
July. 2003 till April 2006
Corporate Name: Ministry of Foreign Trade & Industry.
Department: System & Network Engineer.
Location: Cairo, Egypt
Roles and Responsibilities:
 Participating as a team member in designing and implementing the network infrastructure of Ministry of
 Foreign trade & industry from starting till the final installation of the equipments which Includes:
26/01/17 Page 5
 - Installation & configuration of the edge & core switches.
 - Installation & configuration of the Existing routers.
 - Installation & configuration of the PIX devices.
 - Installation & configuration of the DC, Exchange, ISA, Antivirus servers, SMS 2003.
 - Installation and troubleshooting of OS, Networking software and application packages
 - Installation and troubleshooting of Internet connections, E-Mail etc
 - Trouble shooting day-to-day problems in PC/LAN
References All Available on request
Languages
- Arabic: Mother Tongue
- English: Very Good

More Related Content

What's hot

A Career in Cybersecurity
A Career in CybersecurityA Career in Cybersecurity
A Career in Cybersecuritylfh663
 
Cybersecurity Hands-On Training
Cybersecurity Hands-On TrainingCybersecurity Hands-On Training
Cybersecurity Hands-On TrainingTonex
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest ResumeDhishant Abrol
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updatedInfosecTrain
 
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | EdurekaTop 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | EdurekaEdureka!
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company PresentationChaitanyaS
 
Cisco ccna security
Cisco ccna securityCisco ccna security
Cisco ccna securityMt Mostafa
 
How to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeHow to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeMercury Solutions Limited
 
Isa Chapters Cyber is Hard presentation v1.0
Isa Chapters Cyber  is Hard presentation v1.0Isa Chapters Cyber  is Hard presentation v1.0
Isa Chapters Cyber is Hard presentation v1.0grp362
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOSagarNegi10
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security ChecklistMobeen Khan
 
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...Inno Eroraha [NetSecurity]
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry
 
CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ SagarNegi10
 
Cybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberCybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberWilliam McBorrough
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSOSagarNegi10
 

What's hot (20)

A Career in Cybersecurity
A Career in CybersecurityA Career in Cybersecurity
A Career in Cybersecurity
 
VSEC Company Profile
VSEC Company ProfileVSEC Company Profile
VSEC Company Profile
 
Cybersecurity Hands-On Training
Cybersecurity Hands-On TrainingCybersecurity Hands-On Training
Cybersecurity Hands-On Training
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
 
Yazeed Resume (UPDATED) 2.1
Yazeed Resume (UPDATED) 2.1Yazeed Resume (UPDATED) 2.1
Yazeed Resume (UPDATED) 2.1
 
Case study
Case studyCase study
Case study
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updated
 
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | EdurekaTop 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
 
Cisco ccna security
Cisco ccna securityCisco ccna security
Cisco ccna security
 
How to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeHow to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First Time
 
Isa Chapters Cyber is Hard presentation v1.0
Isa Chapters Cyber  is Hard presentation v1.0Isa Chapters Cyber  is Hard presentation v1.0
Isa Chapters Cyber is Hard presentation v1.0
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
 
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
 
CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+
 
Cybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberCybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen Cyber
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 

Similar to My CV-Jan-2016

M.Yassen_Sr.System & Network Admin_CV
M.Yassen_Sr.System & Network Admin_CVM.Yassen_Sr.System & Network Admin_CV
M.Yassen_Sr.System & Network Admin_CVMahmoud Yassin
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1Sivasankaran Krishnan
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 
Mohamed Elsayed Last Updated 2016
Mohamed Elsayed Last Updated 2016Mohamed Elsayed Last Updated 2016
Mohamed Elsayed Last Updated 2016Hamada hassan
 
Brian_Starr_Resume
Brian_Starr_ResumeBrian_Starr_Resume
Brian_Starr_ResumeBrian Starr
 
Noel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel Alvior
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin Carrow
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...360 BSI
 

Similar to My CV-Jan-2016 (20)

M.Yassen_Sr.System & Network Admin_CV
M.Yassen_Sr.System & Network Admin_CVM.Yassen_Sr.System & Network Admin_CV
M.Yassen_Sr.System & Network Admin_CV
 
Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
 
CV_A-Barakat
CV_A-BarakatCV_A-Barakat
CV_A-Barakat
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
Muhammad.AlSalman2016v1
Muhammad.AlSalman2016v1Muhammad.AlSalman2016v1
Muhammad.AlSalman2016v1
 
Saravanan_Resume_IBM Updated
Saravanan_Resume_IBM UpdatedSaravanan_Resume_IBM Updated
Saravanan_Resume_IBM Updated
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Mohamed Elsayed Last Updated 2016
Mohamed Elsayed Last Updated 2016Mohamed Elsayed Last Updated 2016
Mohamed Elsayed Last Updated 2016
 
Brian_Starr_Resume
Brian_Starr_ResumeBrian_Starr_Resume
Brian_Starr_Resume
 
Abhishek Kumar
Abhishek Kumar Abhishek Kumar
Abhishek Kumar
 
Manoj Kumar_CA
Manoj Kumar_CAManoj Kumar_CA
Manoj Kumar_CA
 
Datasheet
DatasheetDatasheet
Datasheet
 
Noel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CV
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015
 
Tamara M Hayajneh
Tamara M HayajnehTamara M Hayajneh
Tamara M Hayajneh
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
 
Irfan Ur Rehman
Irfan Ur RehmanIrfan Ur Rehman
Irfan Ur Rehman
 

My CV-Jan-2016

  • 1. 26/01/17 Page 1 Adel Zayed Personal Information: Nationality: Egyptian Date of Birth: 1979. Place of Birth: Cairo. Marital Status: Married. GSM no. 054 425 4400 pension.gov.sa@azayedEmail Personal Profile A multi-skilled Network & Security Advisor with good all-round supervisory and technical expertise. Very capable with a proven ability to ensure the smooth Managing of IS Security systems and to provide IT services that will improve the efficiency and performance of a company. Extensive practical knowledge of complex systems builds, hardware and software Security Systems, network support, technical support and Monitoring Systems. Looking for a new and challenging managerial position, one that will make best use of my existing skills & experiences also further my personal development Key competencies and skills Managerial  Ability to identify, understand and give priority to urgent issues.  Able to work on cross-divisional projects.  Experience of recruiting and training new staff.  Skilled decision maker, problem solver, team oriented, team builder  Able to develop, coordinate, delegate and plan work activities.  Dealing calmly and professionally with challenging situations.  Planning each stages of an IT project in detail, and investigating how it can affect a business. IT  Over 14 years of Experience in the fields of network and Security.  Able to identify cost-effective technical solutions that meet business needs.  Excellent analytical, data manipulation and interrogation skills.  Ensuring that all IT changes are managed so that they minimize downtime and risk of any inconvenience.  Developing and maintaining the infrastructure and information security Management systems.
  • 2. 26/01/17 Page 2 Having extensive hands-on experience on all lot of network & Security Technologies:-  Cisco Routers, Switches, Cisco ASA, and IPS  Forigate FW, FortiWeb WAF and Forti Analyzer  Palo Alto FW  FireEye APT  Websense web filtering Gateway & Clear Swift Email Gateway  Juniper Switching and SRX firewall.  MacAfee IPS  F5 LTM & GTM  Riverbed WAN Optimizer  Nexthink End Point Analytics  Virtualization technology “VSphere and VDI”  Windows services AD, DHCP, DNS, WINS, TMG 2010, and Exchange 2007/2010.  Network management S/W ", Ipswich, Manage engine and solarwinds Academic qualifications - BS Communication and computer Engineering 2001, - Faculty of Engineering – Ain shams University. - Very Good grade. Certificates  CISM Certified  CISSP Certified  CCIE Security w.  ISO 27001 Lead Auditor  CEH ver8 Certified  Project Management Professional Certified "PMP".  ITIL Foundation ver3 Certificate.  VMware Certified Professional 5 – Data Center Virtualization (VCP5-DCV)  CCIE R&S w  CCNP- R&S.  CCNP- Security. ADDITIONAL TRAINING  CISM Attendance Course  Microsoft Operation Framework (MOF v4)  MCITP and Exchange 2007  Palo Alto & Fortigate Administration  Data Center Designing Awareness.
  • 3. 26/01/17 Page 3 Career history Oct 2011 – Present: Corporate Name: PUBLIC PENSION AGENCY (PPA). Department: Network & Security Advisor. Location: Riyadh. Job Duties:  Secures the organization and its people by maintaining an intelligence network; designing and implementing policies and strategies of organization security (including internal investigations); safeguarding executives, Board of Directors, and their immediate families from random or premeditated threats; preventing workplace violence; implementing and securing technological protection systems, proprietary information protection, and computer security; providing crisis management; maintaining environmental health and safety.  Determines executive protection requirements by gathering and reviewing pre-planning travel intelligence information; issuing travel advisories; modifying travel itineraries; making travel security arrangements, including guards, secure accommodations, and security-equipped transportation.  Develops new security programs by strategically reviewing existing security programs; conducting comprehensive studies of present and anticipated threats; evaluating, analyzing, and continuously reviewing collection activity results on potential threats against the organization.  Provides protection of organization assets, capital assets, and proprietary assets by providing consulting support; building consensus on the appropriateness and timeliness of physical and electronic monitoring improvements or enhancements; developing and implementing changes.  Provides crisis management team and disaster management team leadership by providing state-of-the art expertise; collecting, analyzing, and summarizing intelligence data and trends; developing cutting-edge strategies.  Maintains protection systems by developing and refining philosophy and design standards relating to protection systems (burglar, fire, and duress alarms and video coverage); re-defining procedures (international and domestic travel, kidnap, ransom, event security); examining organization security emergency response systems; reviewing building design (construction, modifications, walls, fences, and landscape); making recommendations for physical plant security improvements.  Provides information by reviewing, developing, and continually refining security operation's operational manuals and procedures; briefing executives and managers on security-related issues.  Secures information systems by dealing with electronic threats and vulnerabilities, privacy issues, physical security, and operations continuity; applying security forensic technologies; monitoring network and systems management processes; maintaining security platforms with certification authority, and state-of-the-art security management products, tools, and offerings.  Updates job knowledge by maintaining "expert" status in the security industry; applying state- of-the art security measures; participating in educational opportunities; reading professional publications; maintaining personal networks; being sought as an authority to contribute to the security industry body of knowledge; participating in professional organizations.  Enhances organization security reputation by accepting ownership for accomplishing new and different requests; exploring opportunities to add value to job accomplishments; keeping the organization and its people out of harm's way.  Managing Network Security Systems “ Fortigate , Palo Alto , cisco Firewalls “ Cisco routers, ASA, SRX FW, SSL-VPN and ACS.
  • 4. 26/01/17 Page 4  Ensuring all IT systems, infrastructures, server, networks and securities are running to An efficient level.  Guide to the preparation of policies and procedures for information security.  Project Manager for Disaster Recovery (DR Site). April .2006 till May 2011 Corporate Name: Ministry of Islamic Affairs (MOIA). Department: Network & Security Specialist + Project Manager Location: Riyadh Roles and Responsibilities:  Re-engineering of enterprise network designs to meet increasing customer demands  Designed and implemented Internal Computing network infrastructure including Gigabit Ethernet backbone,  100mbs desktop switching  Directly responsible for mentoring and assisting fourteen Network, System, and Application.  Managing / providing support to ALL Ministry branches Locations across the kingdom  Responsible for internal network serving more than 1000 nodes, 25 servers, 50 edge switch, 2 core Switches Cisco routers, ASA, IPS, MARS, LMS, CCM, Unity, GWs  Trouble shooting and problem resolution of all customer network difficulties  7Documentation of all the work done using Visio, Excel and MS word. April .2005 till April 2006 Corporate Name: ICT Training Center. Department: CCNA, CCNP Technical Instructor Location: Cairo, Egypt Roles and Responsibilities: Providing Cisco training courses in various locations including:-  ICT Training center - Cairo.  Engineering Syndicate – Cairo  Faculty of engineers "Ain shams University" July. 2003 till April 2006 Corporate Name: Ministry of Foreign Trade & Industry. Department: System & Network Engineer. Location: Cairo, Egypt Roles and Responsibilities:  Participating as a team member in designing and implementing the network infrastructure of Ministry of  Foreign trade & industry from starting till the final installation of the equipments which Includes:
  • 5. 26/01/17 Page 5  - Installation & configuration of the edge & core switches.  - Installation & configuration of the Existing routers.  - Installation & configuration of the PIX devices.  - Installation & configuration of the DC, Exchange, ISA, Antivirus servers, SMS 2003.  - Installation and troubleshooting of OS, Networking software and application packages  - Installation and troubleshooting of Internet connections, E-Mail etc  - Trouble shooting day-to-day problems in PC/LAN References All Available on request Languages - Arabic: Mother Tongue - English: Very Good